Current Search:  Computer security (x)

View All Items

  • CSV Spreadsheet
(1 - 20 of 70)

Pages

Properties of Static and Mobile Unreliable Networks and their effects on Combating Malicious Objects
Design and analysis of key establishment protocols
Permutation-based transformations for digital multimedia encryption and steganography
Power based wide collision attacks on AES
Comparison of embedded security versus separated security in an application
Data mining heuristic-¬based malware detection for android applications
utility-based routing scheme in multi-hop wireless networks
Fuzzy vault fingerprint cryptography: Experimental and simulation studies
Resource-sensitive intrusion detection models for network traffic
Techniques for combining binary classifiers: A comparative study in network intrusion detection systems
Enhanced 1-D chaotic key-based algorithm for image encryption
Implementing security in an IP Multimedia Subsystem (IMS) next generation network - a case study
Machine learning algorithms for the analysis and detection of network attacks
An Empirical Study of Ordinal and Non-ordinal Classification Algorithms for Intrusion Detection in WLANs
Evaluating indirect and direct classification techniques for network intrusion detection
Mitigating worm propagation on virtual LANs
Firewall formulation driven by risk analysis
Intrusion detection in wireless networks: A data mining approach
Misuse Patterns for the SSL/TLS Protocol
Unifying the conceptual levels of network security through the use of patterns

Pages